Today, enterprises are increasingly integrating third-party vendors in an attempt to facilitate the streamlining of business processes. Nonetheless, such vendors also boost the IT environment, increasing the threats that their data security controls face. The data sharing and … [Read more...]
PCI Log Management Requirements for CISO’s
Whether you are in the healthcare, retail or hospitality industry, you need to protect your customer information if you collect payments. The Payment Card Industry Data Security Standard (PCI DSS) sets the standard for cardholder data (CD) and also enforces the standard with … [Read more...]
What is an IT Security Audit?
You’ve probably experienced the trauma that comes along with an IT security audit. If you have, then you’ll agree that technical reviews involved in the process are highly complex. However, a security audit is necessary since it guarantees data security of your firm. It involves … [Read more...]
Audit Log Best Practices for Information Security
As data threats continue to increase in both quantity and sophistication, security programs have become a necessity for most businesses. You probably already have a program for monitoring your security environment and tweaking relevant controls as necessary. However, simply … [Read more...]
Why ITAD is essential to managing e-waste and old data
Like most acronyms, ITAD is a bit of a mouthful. It stands for Information Technology Asset Disposition, and while it doesn’t roll off the tongue, it is increasingly essential in securing old data and managing e-waste. So, what does this entail and how can it really help … [Read more...]
- « Previous Page
- 1
- …
- 70
- 71
- 72
- 73
- 74
- …
- 81
- Next Page »